CN111698747B - Roaming method and device - Google Patents

Roaming method and device Download PDF

Info

Publication number
CN111698747B
CN111698747B CN202010361702.8A CN202010361702A CN111698747B CN 111698747 B CN111698747 B CN 111698747B CN 202010361702 A CN202010361702 A CN 202010361702A CN 111698747 B CN111698747 B CN 111698747B
Authority
CN
China
Prior art keywords
client
backup
information
main
roaming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010361702.8A
Other languages
Chinese (zh)
Other versions
CN111698747A (en
Inventor
吴清根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN202010361702.8A priority Critical patent/CN111698747B/en
Publication of CN111698747A publication Critical patent/CN111698747A/en
Application granted granted Critical
Publication of CN111698747B publication Critical patent/CN111698747B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/38Reselection control by fixed network equipment

Abstract

The application provides a roaming method and a roaming device, wherein the method is applied to backup AC, and comprises the following steps: the backup AC receives the notification message sent by the first main AC and locally stores roaming information of the client included in the notification message; when the client roams to the second AP, the backup AC receives a first query message sent by the second main AC, wherein the first query message comprises access information of the client; when the roaming information matched with the access information is found locally, the backup AC sends a check passing message to the second main AC, so that the second main AC obtains the user information from the first main AC through the backup AC, and the client performs data communication through the second main AC.

Description

Roaming method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a roaming method and apparatus.
Background
Currently, with the popularization of Wireless LAN (WLAN for short), the network scale is increasing, and at the same time, higher requirements are also put on the reliability of the network, so that a large-scale and high-reliability network, such as an n+1 large-scale network model shown in fig. 1, is gradually generated.
In fig. 1, an N master Access Controller (AC) manages Access Points (APs) to access itself, and one AC is a backup AC. When a certain main AC is abnormal, the backup AC receives the service, and the AP accessed to the main AC is registered in the backup AC. For example, after the primary AC3 is abnormal, the AP3 registers in the backup AC and continues to provide network services.
In the foregoing networking, a private roaming tunnel is established between each primary AC and each backup AC, and client entries are mutually synchronized between each AC, so as to implement roaming of clients (clients).
However, private roaming tunnels are established between the ACs in pairs, so that the synchronous information quantity is large, the network complexity is increased, and the network anomaly investigation complexity is increased, so that the daily maintenance is not facilitated.
Disclosure of Invention
In view of this, the present application provides a roaming method and apparatus, which are used to solve the problems of large synchronous information quantity between AC, increased network complexity and network anomaly investigation complexity in the prior art, and unfavorable for daily maintenance.
In a first aspect, the present application provides a roaming method, where the method is applied to a backup AC, where the backup AC is in a WLAN, and the WLAN further includes a client, a first main AC, a second main AC, a first AP, and a second AP, where the client accesses the first main AC through the first AP, and the second AP accesses the second main AC, where the method includes:
The backup AC receives a notification message sent by a first main AC and locally stores roaming information of a client included in the notification message;
when the client roams to the second AP, the backup AC receives a query message sent by the second main AC, wherein the query message comprises access information of the client;
when roaming information matched with the access information is found locally, the backup AC sends a verification passing message to the second main AC, so that the second main AC obtains user information from the first main AC through the backup AC, and the client performs data communication through the second main AC.
In a second aspect, the present application provides a roaming method, where the method is applied to a backup AC, where the backup AC is in a WLAN, and the WLAN further includes a client, a first main AC, a first AP, and a second AP, where the client accesses the first main AC through the first AP, and the second AP accesses the backup AC, where the method includes:
the backup AC receives the notification message sent by the first main AC and locally stores roaming information of a client included in the notification message;
when the client roams to the second AP, the backup AC acquires access information of the client through the second AP;
when roaming information matched with the access information is found locally, the backup AC acquires user information of the client from the first main AC, and the client performs data communication through the backup AC.
In a third aspect, the present application provides a roaming device, where the device is applied to a backup AC, where the backup AC is in a WLAN, and the WLAN further includes a client, a first master AC, a second master AC, a first AP, and a second AP, where the client accesses the first master AC through the first AP, and the second AP accesses the second master AC, where the device includes:
a receiving unit, configured to receive a notification message sent by a first master AC;
a storage unit for locally storing roaming information of the client included in the notification message;
the receiving unit is further configured to receive a first query message sent by the second master AC when the client roams to the second AP, where the first query message includes access information of the client;
and the sending unit is used for sending a verification passing message to the second main AC when roaming information matched with the access information is locally searched, so that the second main AC obtains user information from the first main AC through the backup AC, and the client side performs data communication through the second main AC.
In a fourth aspect, the present application provides a roaming device, where the device is applied to a backup AC, where the backup AC is in a WLAN, and the WLAN further includes a client, a first main AC, a first AP, and a second AP, where the client accesses the first main AC through the first AP, and the second AP accesses the backup AC, where the device includes:
A receiving unit, configured to receive a notification message sent by a first master AC;
a storage unit for locally storing roaming information of the client included in the notification message;
the acquisition unit is used for acquiring the access information of the client through the second AP when the client roams to the second AP;
the obtaining unit is further configured to, when roaming information matching the access information is found locally, obtain, by the backup AC, user information of the client from the first primary AC, where the client performs data communication through the backup AC.
In a fifth aspect, the present application provides a network device comprising a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor to cause the processor to perform the methods provided in the first and second aspects of the application.
Therefore, by applying the roaming method and the roaming device provided by the application, after the backup AC receives the notification message sent by the first main AC, the roaming information of the client included in the notification message is stored locally. When the client roams to the second AP, the backup AC receives a first query message sent by the second primary AC, wherein the first query message comprises access information of the client. When roaming information matched with the access information is found locally, the backup AC sends a verification passing message to the second main AC, so that the second main AC obtains user information from the first main AC through the backup AC, and the client performs data communication through the second main AC. The method and the device solve the problems that in the prior art, the synchronous information quantity between ACs is large, the network complexity and the network abnormality investigation complexity are increased, and the daily maintenance is not facilitated.
Drawings
FIG. 1 is a schematic diagram of an N+1 large network model provided in the prior art;
fig. 2 is a schematic diagram of WLAN n+1 networking roaming support according to an embodiment of the present application;
FIG. 3 is a roaming timing diagram of a conventional client of an N+1 reliability network according to an embodiment of the present application;
FIG. 4 is a roaming timing diagram of an authentication-free client of an N+1 reliability network 802.1X according to an embodiment of the present application;
fig. 5 is a schematic diagram of another WLAN n+1 networking roaming support provided in an embodiment of the present application;
FIG. 6 is a timing diagram of roaming of an N+1 reliability network client between a primary AC and a backup AC provided by an embodiment of the present application;
fig. 7 is a block diagram of a roaming device according to an embodiment of the present application;
FIG. 8 is a diagram illustrating another roaming device according to an embodiment of the present application;
fig. 9 is a hardware structure diagram of a network device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the corresponding listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the application. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
The roaming method provided by the embodiment of the application is described in detail below. Referring to fig. 2, fig. 2 is a schematic diagram of WLAN n+1 networking roaming support according to an embodiment of the present application. In WLAN n+1 high reliability networking, the system mainly comprises a client, a plurality of APs, a plurality of primary ACs and a backup AC. Each main AC establishes a roaming tunnel with the backup AC one by one, and no roaming tunnel is established between the main ACs. The client selects one AP access from a plurality of APs, and each AP accesses one main AC. When the client is first on-line to the first main AC, the first main AC synchronizes roaming information of the client to the backup AC.
After the client roams from one AP to another AP, when a second main AC accessed by the AP after roaming is on line, the second main AC inquires the roaming information of the client from the backup AC. If the backup AC inquires the matched roaming information, the second main AC acquires the user information of the client from the first main AC through the backup AC; meanwhile, the backup AC informs the first main AC to delete the user information of the client and update the roaming information of the locally stored client.
In embodiments of the present application, the backup AC may also be referred to as a Roaming Relay (Roaming Relay).
In one scenario, the embodiment of the present application provides a roaming process when the client is a regular client, as shown in fig. 3, and fig. 3 is a roaming timing diagram of the regular client in the n+1 reliability network provided by the embodiment of the present application. The roaming method according to the embodiment of the present application will be described below by taking fig. 3 as an example.
Step 300, the client is firstly on line at the first AP and accesses the first main AC.
Specifically, in the embodiment of the application, the client selects the first AP to access the wireless network. The first AP is accessed to the first main AC, an AP management tunnel is established between the first AP and the first main AC, and a roaming tunnel is established between the first main AC and the backup AC. The client is online at the first AP and is interactively accessed at the first main AC through a wireless management message.
Step 301, the first primary AC locally adds user information of the client, and sends a notification message to the backup AC.
Specifically, after the client accesses the first main AC, the first main AC obtains the user information of the client, and adds the user information of the client locally. The first primary AC sends a notification message to the backup AC, the notification message being used to inform the backup AC to add roaming information of the client.
In the embodiment of the application, the user information of the client comprises the MAC address of the client, the physical attribute information of the user, the network access information, the user security information and the server authorization information. The user physical attribute information specifically comprises SSID and VLAN; the network access information specifically comprises an IP address of an AP (access point) which is accessed by the client, an IP address of an AC which is accessed by the client, a BSSID (service set identifier), an authentication mode, an encryption mode and the like of the client; the user security information specifically includes user identity information, authentication key information, authorization information, and the like.
It can be understood that, after the client accesses the network through the AP managed by the master AC, the master AC may obtain the user information of the client.
In this step, the notification message specifically includes the MAC address, SSID, VLAN, network access information, and user security information of the client.
Step 302, the backup AC receives the notification message sent by the first primary AC, and locally stores roaming information of the client included in the notification message.
Specifically, after receiving the notification message, the backup AC acquires the MAC address, SSID, VLAN, network access information, and user security information of the client from the notification message. The backup AC locally stores roaming information of the client, including MAC address, SSID, VLAN, network access information, and user security information of the client. Specific roaming information is shown in table 1 below.
Table 1 roaming information
MAC address SSID VLAN Network access information Security information
1111-1111-1111 1 1
In the foregoing step 301, the content specifically included in the network access information is described by way of example, for example, the IP address of the AP to which the client is currently connected, the IP address of the AC, the BSSID, the authentication method of the client, the encryption method, and the like. In this step, the backup AC uniformly records the contents included in the network access information at the "network access information" field in the above table 1.
Step 303, the client performs data communication through the first main AC.
Step 304, when the client roams to the second AP, access the second primary AC.
Specifically, in the embodiment of the present application, the second AP accesses the second primary AC, and a roaming tunnel is established between the second primary AC and the backup AC. When the client roams to the wireless network covered by the second AP, the client selects the second AP to access the wireless network, and is online at the second AP, and the client is interactively accessed at the second main AC through a wireless management message.
In step 305, the second primary AC sends a query message to the backup AC, the query message including access information of the client.
Specifically, after the client accesses the second main AC, the second main AC obtains access information of the client, where the access information includes a MAC address, an SSID, and network access information of the client. The second master AC generates a query message that includes access information for the client.
The second primary AC sends a query message to the backup AC.
Step 306, when roaming information matched with the access information is found locally, the backup AC sends a verification passing message to the second main AC.
Specifically, after receiving the query message, the backup AC obtains the access information from the query message. The backup AC searches for whether roaming information matching the access information exists in the locally stored roaming information. If so, the backup AC generates a check passing message and sends the check passing message to the second master AC.
Further, the backup AC searches for roaming information in the locally stored roaming information that matches the MAC address of the client, the service set identifier SSID, and the network access information. If so, the backup AC generates a check pass message.
Step 307, the second primary AC sends a migration user request message to the backup AC, where the migration user request message includes attribute information of the client.
Specifically, after receiving the verification passing message, the second master AC generates a migration user request message, where the migration user request message includes attribute information of the client. The second primary AC sends a migration user request message to the backup AC.
In the embodiment of the application, the attribute information of the client specifically comprises the MAC address of the client and the BSS service identifier BSSID where the client is located. The BSS service identifier BSSID of the client is used for indicating the AP to which the client is currently connected. In the embodiment of the present application, the BSSID where the client is located is used to indicate the second AP.
Step 308, the backup AC forwards the migration user request message to the first primary AC according to the attribute information.
Specifically, the backup AC receives the migration user request message and obtains attribute information therefrom. According to the MAC address of the client and the BSSID of the client, the backup AC determines that the primary AC accessed by the local recording client before roaming is the first primary AC, and the backup AC acquires the IP address of the first primary AC through network access information contained in the locally stored roaming information. The backup AC forwards the migration user request message to the first primary AC.
Step 309, the first primary AC sends a migration user response message to the backup AC, the migration user response message including user information.
Specifically, the first master AC acquires attribute information from the migration user request message after receiving the migration user request message. According to the MAC address of the client and the BSSID of the client, the first main AC acquires user information matched with the MAC address of the client from locally stored user information. Meanwhile, the first master AC determines that the client has roamed from the first AP to the second AP according to the BSSID where the client is located.
The first master AC generates a migration user response message that includes the user information obtained by the first master AC.
The first primary AC sends a migration user response message to the backup AC.
Step 310, the backup AC forwards the migration user response message to the second primary AC.
Specifically, after receiving the migration user response message, the backup AC determines that the migration user request message corresponding to the migration user response message is sent by the second primary AC. At this point, the backup AC continues to forward the migration user response message to the second primary AC.
Step 311, the second primary AC stores the user information locally and sends an update message to the backup AC.
Specifically, after receiving the migration user response message, the second master AC obtains user information from the migration user response message. The second master AC updates the user information. For example, the IP address of the AP to which the client is currently connected, the IP address of the AC to which the client is currently connected, and the user security information included in the network access information are updated.
The second main AC locally stores the updated user information and generates an update message, wherein the update message comprises the MAC address of the client, the IP address of the second AP accessed by the client currently, the IP address of the second main AC and the user security information after the client and the second main AC carry out access negotiation.
The second primary AC sends an update message to the backup AC.
Step 312, the backup AC updates the roaming information according to the update message, and sends a delete message to the first primary AC.
Specifically, after receiving the update message, the backup AC obtains the MAC address of the client, the IP address of the second AP to which the client is currently connected, the IP address of the second primary AC, and the user security information after the client performs access negotiation with the second primary AC.
And searching the locally stored roaming information by the backup AC according to the MAC address of the client. The backup AC obtains roaming information matching the MAC address of the client from the locally stored roaming information.
The backup AC updates partial information in the roaming information by using the acquired IP address of the second AP which is accessed by the client currently, the IP address of the second main AC and the user security information after the client and the second main AC carry out access negotiation. For example, the IP address of the AP to which the client is currently connected, the IP address of the AC to which the client is currently connected, and the user security information included in the network access information are updated.
Since the backup AC records the IP address of the primary AC to which the client is currently connected in the network access information included in the local roaming information after the client is first connected to a primary AC. Therefore, in this step, the backup AC determines the primary AC to which the client has access before roaming according to the IP address of the primary AC recorded in the network access information before updating.
In the embodiment of the application, the backup AC determines that the primary AC accessed before the client roams is the first primary AC. The backup AC generates a delete message that includes the client's MAC address and the BSSID where the client is located. The BSSID of the client is used to indicate the second AP.
The backup AC sends a delete message to the first primary AC.
Step 313, the first master AC deletes the locally stored user information of the client.
Specifically, the first master AC receives the delete message, and obtains the MAC address of the client and the BSSID where the client is located from the delete message.
And acquiring the corresponding matched user information from the locally stored user information according to the MAC address of the client. Meanwhile, the first master AC determines that the client has roamed from the first AP to the second AP according to the BSSID where the client is located.
The first master AC deletes the previously acquired user information.
Step 314, the client communicates data through the second primary AC.
Therefore, by applying the roaming method provided by the application, after the backup AC receives the notification message sent by the first main AC, the roaming information of the client included in the notification message is stored locally. When the client roams to the second AP, the backup AC receives a first query message sent by the second primary AC, wherein the first query message comprises access information of the client. When roaming information matched with the access information is found locally, the backup AC sends a verification passing message to the second main AC, so that the second main AC obtains user information from the first main AC through the backup AC, and the client performs data communication through the second main AC. The method and the device solve the problems that in the prior art, the synchronous information quantity between ACs is large, the network complexity and the network abnormality investigation complexity are increased, and the daily maintenance is not facilitated.
In another scenario, the embodiment of the present application provides a roaming process when the client is an 802.1X client, as shown in fig. 4, and fig. 4 is an n+1 reliability network 802.1X authentication-free client roaming timing diagram provided by the embodiment of the present application. The roaming method according to the embodiment of the present application will be described below by taking fig. 4 as an example.
Step 400, the client is first online at the first AP and accesses the first master AC.
Specifically, in the embodiment of the present application, the client is an 802.1X client.
Step 401, the first main AC locally adds user information of the client, and sends a notification message to the backup AC.
Specifically, in this step, the network access information includes, in addition to the information described in step 310 of the foregoing embodiment, the IP address of the AC to which the client is first accessed.
Step 402, the backup AC receives the notification message sent by the first primary AC, and locally stores roaming information of the client included in the notification message.
Specifically, if the client is online for the first time, the IP address of the AC to which the client is first connected is the same as the IP address of the AC to which the client is currently connected. In the embodiment of the application, the client accesses the first main AC for the first time, and the IP address of the AC accessed by the client for the first time and the IP address of the AC accessed by the client at present are both the IP addresses of the first main AC.
Step 403, the client performs data communication through the first main AC.
Step 404, when the client roams to the second AP, accessing the second primary AC.
It should be noted that, in the embodiment of the present application, the process from step 400 to step 404 is similar to the process from step 300 to step 304 in the previous embodiment of the present application, and will not be repeated here.
Step 405, the second primary AC sends a query message to the backup AC, where the query message includes access information of the client.
Specifically, after the client accesses the second master AC, the second master AC obtains access information of the client, where the access information includes a MAC address, an SSID, network access information, and key information of the client. The second master AC generates a query message that includes access information for the client.
The second primary AC sends a query message to the backup AC.
Step 406, when roaming information matched with the access information is found locally, the backup AC sends a verification passing message to the second primary AC.
Specifically, after receiving the query message, the backup AC obtains the access information from the query message. The backup AC searches for whether roaming information matching the access information exists in the locally stored roaming information. If so, the backup AC generates a check passing message and sends the check passing message to the second master AC.
Further, the backup AC searches for roaming information matching the MAC address of the client, the service set identifier SSID, the network access mode, and the key information in the locally stored roaming information. If so, the backup AC generates a check pass message.
In the embodiment of the application, if the backup AC locally has roaming information matched with the MAC address of the client, the service set identifier SSID and the network access mode, and the pair master key identifiers are consistent, the backup AC production check passes the message.
The paired master key identification is obtained by carrying out algorithm processing on the paired master key, and the paired master key is notified and issued by the AAA server. After the client authentication is passed, the AAA server issues a pairwise master key matched with the client to the AC. After the paired master key is obtained, the paired master key is subjected to algorithm processing to obtain the paired master key identification. The AC stores the pairwise master key identification in the user information of the client.
Step 407, the second primary AC sends an update user request message to the backup AC, where the migration user request message includes attribute information of the client.
Specifically, after the second master AC receives the verification passing message, the second master AC determines that the client does not need to perform 802.1X authentication again. The second master AC generates an update user request message including attribute information of the client. The second primary AC sends an update user request message to the backup AC.
In the embodiment of the application, the attribute information of the client specifically comprises the MAC address of the client and the BSS service identifier BSSID where the client is located. The BSS service identifier BSSID of the client is used for indicating the AP to which the client is currently connected. In the embodiment of the present application, the BSSID where the client is located is used to indicate the second AP.
Step 408, the backup AC forwards the update user request message to the first primary AC according to the attribute information.
Specifically, after receiving the update user request message, the backup AC obtains attribute information from the update user request message, and according to the MAC address of the client and the BSSID where the client is located, the backup AC obtains the IP address of the first main AC through network access information included in the locally stored roaming information. And if the backup AC determines that the local recording client is currently accessed to the first main AC, the backup AC forwards an update user request message to the first main AC.
Step 409, the first primary AC sends an update user response message to the backup AC, the update user response message including the user information.
Specifically, after receiving the update user request message, the first master AC obtains attribute information from the update user request message, and according to the MAC address of the client and the BSSID where the client is located, the first master AC obtains user information matched with the MAC address of the client from locally stored user information. Meanwhile, the first main AC determines that the client roams from the first AP to the second AP according to the BSSID where the client is located.
The first master AC updates part of the user information. For example, the IP address of the AP to which the client is currently connected, the IP address of the AC to which the client is currently connected, and the user security information included in the network access information are updated.
The updated network access information includes that the IP address of the AP accessed by the client is the IP address of the second AP, and the IP address of the AC accessed by the client is the IP address of the second main AC. While the IP address of the AC to which the client is first accessed is still the IP address of the first master AC.
The first primary AC generates an update user response message that includes updated user information of the first primary AC.
The first primary AC sends an update user response message to the backup AC.
Step 410, the backup AC forwards the update user response message to the second primary AC.
Specifically, after receiving the update user response message, the backup AC determines that the update user request message corresponding to the update user response message is sent by the second primary AC. At this point, the backup AC continues to forward the update user response message to the second primary AC.
Step 411, the second master AC stores the user information locally.
Specifically, after receiving the migration user response message, the second master AC obtains user information from the migration user response message. The second master AC stores the user information locally.
Step 412, the client communicates data through the second primary AC.
Step 413, the second primary AC periodically sends a charging update message to the backup AC, where the charging update message includes the MAC address of the client, the traffic information, and the access AP information.
Specifically, the second master AC generates a charging update message including the MAC address of the client, traffic information, and access AP information.
The second primary AC periodically sends a charging update message to the backup AC.
Step 414, the backup AC forwards the charging update message to the first master AC according to the MAC address of the client.
Specifically, after receiving the charging update message, the backup AC obtains the MAC address, the traffic information, and the access AP information of the client from the charging update message. According to the MAC address of the client, the backup AC determines that the AC for carrying out flow charging for the client is a first main AC, and the first main AC can carry out charging interaction with an authentication, authorization and charging (generally: authentication, authorization, accounting, abbreviated: AAA) server.
The backup AC sends a charging update message to the first primary AC.
In step 415, the first master AC performs charging interaction with the 3A server according to the MAC address, the traffic information, and the access AP information of the client.
Specifically, after receiving the charging update message, the first main AC obtains the MAC address, the traffic information and the access AP information of the client from the charging update message. And the first main AC performs charging interaction with the AAA server according to the MAC address, the flow information and the accessed AP information of the client.
In the embodiment of the application, for the 802.1X type client, the roaming information is queried and checked at the backup AC, and if the roaming information exists and passes the check, the client does not need to perform 802.1X authentication again. The user information of the client may be migrated from the pre-roaming access master AC, which does not delete the user information of the client, which continues to interact with the AAA, the server performs accounting interactions with respect to the roaming client.
In another scenario, after a certain primary AC is abnormal (e.g., fails, loses power, etc.), the backup AC takes over the AP managed by the abnormal primary AC, as shown in fig. 5, and fig. 5 is another WLAN n+1 network roaming support schematic provided in the embodiment of the present application. In fig. 5, the second primary AC is anomalous and a second AP accessing the second primary AC is taken over by the backup AC.
In this scenario, the present application provides a roaming process of a client between a primary AC and a backup AC, as shown in fig. 6, and fig. 6 is a roaming timing diagram of an n+1 reliability network client between a primary AC and a backup AC according to an embodiment of the present application. The roaming method according to the embodiment of the present application will be described below by taking fig. 6 as an example.
Step 600, the client first comes on line at the first AP, and accesses the first master AC.
In step 601, the first primary AC locally adds user information of the client, and sends a notification message to the backup AC.
In step 602, the backup AC receives the notification message sent by the first primary AC, and locally stores roaming information of the client included in the notification message.
Step 603, the client performs data communication through the first main AC.
It should be noted that, in the embodiment of the present application, the process from step 600 to step 603 is similar to the process from step 300 to step 303 in the previous embodiment of the present application, and will not be repeated here.
Step 604, when the client roams to the second AP, the backup AC is accessed.
Specifically, in the embodiment of the application, the second main AC is abnormal, the second AP accesses the backup AC, and an AP management tunnel is established between the second AP and the backup AC. When the client roams to the wireless network covered by the second AP, the client selects the second AP to access the wireless network, and is online at the second AP, and the client is interactively accessed at the backup AC through a wireless management message.
Step 605, the backup AC obtains access information of the client through the second AP.
Specifically, after the client accesses the backup AC, the backup AC obtains access information of the client through the second AP, where the access information includes a MAC address, an SSID, and network access information of the client.
Step 606, when roaming information matched with the access information is found locally, the backup AC sends a migration user request message to the first primary AC.
Specifically, after the backup AC obtains the access information, it searches for whether roaming information matching the access information exists in the locally stored roaming information. If so, the backup AC generates a migration user request message and determines that the primary AC accessed by the local recording client before roaming is the first primary AC. The backup AC sends a migration user request message to the first primary AC.
Further, the backup AC searches for roaming information in the locally stored roaming information that matches the MAC address of the client, the service set identifier SSID, and the network access information. If so, the backup AC generates a migrate user request message.
In the embodiment of the application, the migration user request message comprises attribute information of the client. The attribute information of the client specifically includes the MAC address of the client and the BSS service identifier BSSID where the client is located. In the embodiment of the present application, the BSSID of the client is used to indicate the second AP.
In step 607, the first AC sends a migration user response message to the backup AC, the migration user response message including user information.
Specifically, after receiving the migration user request message, the first master AC obtains attribute information from the migration user request message, and according to the MAC address of the client and the BSSID where the client is located, the first master AC obtains user information matched with the MAC address of the client from locally stored user information. Meanwhile, the first master AC determines that the client has roamed from the first AP to the second AP according to the BSSID where the client is located.
The first master AC generates a migration user response message that includes the user information obtained by the first master AC.
The first primary AC sends a migration user response message to the backup AC.
Step 608 the backup AC stores the user information locally,
specifically, the backup AC receives the migration user response message and obtains the user information therefrom. The backup AC updates a part of the user information. For example, the network access information includes an IP address of an AP to which the client is currently connected, an IP address of an AC to which the client is currently connected, and user security information.
The updated user information is stored locally by backup.
Step 609, the backup AC updates the local roaming information and sends a delete message to the first primary AC.
Specifically, after the backup AC stores the updated user information, the backup AC obtains the MAC address of the client therefrom, and searches for the locally stored roaming information according to the MAC address of the client. The backup AC obtains roaming information matching the MAC address of the client from the locally stored roaming information.
The backup AC updates part of the information in the roaming information by using the updated user information stored in step 608, for example, updates the IP address of the AP to which the client is currently connected, the IP address of the AC to which the client is currently connected, and the user security information included in the network access information.
After the backup AC updates the roaming information, deletion information is generated, where the deletion information includes the MAC address of the client and the BSSID where the client is located. The BSSID of the client is used to indicate the second AP.
Since the backup AC records the IP address of the primary AC to which the client is currently connected in the network access information included in the local roaming information after the client is first connected to a primary AC. Therefore, in this step, the backup AC determines the primary AC to which the client has access before roaming according to the IP address of the primary AC recorded in the network access information before updating.
In the embodiment of the application, the backup AC determines that the primary AC accessed before the client roams is the first primary AC. The backup AC sends a delete message to the first primary AC.
Step 610, the first master AC deletes the locally stored user information of the client.
Specifically, the first master AC receives the delete message, and obtains the MAC address of the client and the BSSID where the client is located from the delete message.
And acquiring the corresponding matched user information from the locally stored user information according to the MAC address of the client. Meanwhile, the first master AC determines that the client has roamed from the first AP to the second AP according to the BSSID where the client is located.
The first master AC deletes the previously acquired user information.
Step 611, the client performs data communication through the backup AC.
Therefore, by applying the roaming method provided by the embodiment of the application, after the backup AC receives the notification message sent by the first main AC, the roaming information of the client included in the notification message is stored locally. When the client roams to the second AP, the backup AC acquires access information of the client through the second AP. When roaming information matched with the access information is found locally, the backup AC acquires user information from the first main AC, the client accesses the second main AC through the second AP, and data communication is carried out through the second main AC. The method and the device solve the problems that in the prior art, the synchronous information quantity between ACs is large, the network complexity and the network abnormality investigation complexity are increased, and the daily maintenance is not facilitated.
Based on the same inventive concept, the embodiment of the application also provides a roaming device corresponding to the roaming method described in the above fig. 3 and fig. 4. Referring to fig. 7, fig. 7 is a block diagram of a roaming device provided by an embodiment of the present application, where the backup AC is applied to a backup AC, where the WLAN further includes a client, a first primary AC, a second primary AC, a first AP, and a second AP, where the client accesses the first primary AC through the first AP, and the second AP accesses the second primary AC, and the device includes:
A receiving unit 710, configured to receive a notification message sent by the first master AC;
a storage unit 720, configured to locally store roaming information of the client included in the notification message;
the receiving unit 710 is further configured to, when the client roams to the second AP, receive a first query message sent by the second primary AC, where the first query message includes access information of the client;
and a sending unit 730, configured to send a check passing message to the second master AC when the roaming information matched with the access information is found locally, so that the second master AC obtains the user information from the first master AC through the backup AC, and the client performs data communication through the second master AC.
Optionally, the receiving unit 710 is further configured to receive a migration user request message sent by the second master AC according to the verification notification message, where the migration user request message includes attribute information of the client;
the sending unit 730 is further configured to forward the migration user request message to the first primary AC according to the attribute information;
the receiving unit 710 is further configured to receive a migration user response message sent by the first master AC according to the migration user request message, where the migration user response message includes the user information;
The backup AC forwards the migration user response message to the second primary AC to cause the second primary AC to store the user information locally.
Optionally, the receiving unit 710 is further configured to receive an update message sent by the second master AC, and update the roaming information according to the update message;
the sending unit 730 is further configured to send a deletion message to the first master AC, so that the first master AC deletes the user information stored locally.
Optionally, the access information includes a MAC address of the client, a service set identifier SSID, and network access information;
the apparatus further comprises: a searching unit (not shown in the figure), specifically configured to search for whether roaming information consistent with the MAC address of the client, the service set identifier SSID, and the network access information included in the access information exists in the locally stored roaming information;
the sending unit 730 is further configured to send a check passing message to the second master AC if the check passing message exists.
Optionally, the client is an 802.1X client, and the access information includes a MAC address of the client, a service set identifier SSID, network access information, and key information;
The searching unit (not shown in the figure) is specifically configured to search for whether roaming information consistent with the MAC address of the client, the service set identifier SSID, network access information, and key information included in the access information exists in locally stored roaming information;
the sending unit 730 is further configured to send a check passing message to the second master AC if the check passing message exists.
Optionally, the receiving unit 710 is further configured to receive an update user request message sent by the second master AC according to the verification notification message, where the update user request message includes attribute information of the client;
the sending unit 730 is further configured to forward the update user request message to the first master AC according to the attribute information, so that the first master AC updates the user information;
the receiving unit 710 is further configured to receive an update user response message sent by the first master AC according to the update user request message, where the update user response message includes updated user information;
the sending unit 730 is further configured to forward the updated user response message to the second master AC, so that the second master AC stores the updated user information locally.
Optionally, the receiving unit 710 is further configured to receive a charging update message periodically sent by the second master AC, where the charging update message includes a MAC address of the client, traffic information, and access AP information;
the sending unit 730 is further configured to forward the charging update message to the first master AC according to the MAC address of the client, so that the first master AC performs charging interaction with the AAA server according to the MAC address of the client, the traffic information, and the accessed AP information.
Therefore, by applying the roaming device provided by the application, after the backup AC receives the notification message sent by the first main AC, the roaming information of the client included in the notification message is stored locally. When the client roams to the second AP, the backup AC receives a first query message sent by the second primary AC, wherein the first query message comprises access information of the client. When roaming information matched with the access information is found locally, the backup AC sends a check passing message to the second main AC, so that after the second main AC obtains user information from the first main AC through the backup AC, the client accesses the second main AC through the second AP, and performs data communication through the second main AC. The method and the device solve the problems that in the prior art, the synchronous information quantity between ACs is large, the network complexity and the network abnormality investigation complexity are increased, and the daily maintenance is not facilitated.
Based on the same inventive concept, the embodiment of the application also provides a roaming device corresponding to the roaming method described in fig. 6. Referring to fig. 8, fig. 8 is a block diagram of another roaming device provided in an embodiment of the present application, where the backup AC is applied to a WLAN, and the WLAN further includes a client, a first primary AC, a first AP, and a second AP, where the client accesses the first primary AC through the first AP, and the second AP accesses the backup AC, and the device includes:
a receiving unit 810, configured to receive a notification message sent by the first master AC;
a storage unit 820 for locally storing roaming information of the client included in the notification message;
an obtaining unit 830, configured to obtain, when the client roams to the second AP, access information of the client through the second AP;
the obtaining unit 830 is further configured to obtain, when the roaming information matching the access information is found locally, user information of the client from the first primary AC by using the backup AC, where the client performs data communication through the backup AC.
Optionally, the apparatus further comprises: a transmitting unit (not shown in the figure) for transmitting a migration user request message to the first master AC;
The receiving unit 810 is further configured to receive a migration user response message sent by the first master AC according to the migration user request message, where the migration user response message includes the user information;
and an updating unit (not shown in the figure) for updating the user information and storing the updated user information locally.
Optionally, the updating unit (not shown in the figure) is further configured to update the roaming information according to the updated user information;
the transmitting unit (not shown in the figure) is further configured to transmit a deletion message to the first master AC, so that the first master AC deletes the user information stored locally.
Optionally, the access information includes a MAC address of the client, a service set identifier SSID, and network access information;
the apparatus further comprises: a searching unit (not shown in the figure) for searching whether roaming information consistent with the MAC address of the client, the service set identifier SSID and the network access information included in the access information exists in the locally stored roaming information;
the obtaining unit 830 is further configured to obtain, if any, user information of the client from the first main AC.
Therefore, by applying the roaming device provided by the application, after the backup AC receives the notification message sent by the first main AC, the roaming information of the client included in the notification message is stored locally. When the client roams to the second AP, the backup AC acquires access information of the client through the second AP. When roaming information matched with the access information is found locally, the backup AC acquires user information from the first main AC, the client accesses the second main AC through the second AP, and data communication is carried out through the second main AC. The method and the device solve the problems that in the prior art, the synchronous information quantity between ACs is large, the network complexity and the network abnormality investigation complexity are increased, and the daily maintenance is not facilitated.
Based on the same inventive concept, the embodiment of the present application also provides a network device, as shown in fig. 9, including a processor 910, a transceiver 920, and a machine-readable storage medium 930, where the machine-readable storage medium 930 stores machine-executable instructions that can be executed by the processor 910, and the processor 910 is caused to perform the roaming method provided by the embodiment of the present application. The roaming device shown in fig. 7 and 8 may be implemented by using a hardware structure of the network device shown in fig. 9.
The computer readable storage medium 930 may include a random access Memory (in english: random Access Memory, abbreviated as RAM) or a nonvolatile Memory (in english: non-volatile Memory, abbreviated as NVM), such as at least one magnetic disk Memory. Optionally, the computer readable storage medium 930 may also be at least one storage device located remotely from the processor 910.
The processor 910 may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; it may also be a digital signal processor (English: digital Signal Processor; DSP; for short), an application specific integrated circuit (English: application Specific Integrated Circuit; ASIC; for short), a Field programmable gate array (English: field-Programmable Gate Array; FPGA; for short), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components.
In an embodiment of the present application, processor 910 is enabled by reading machine-executable instructions stored in machine-readable storage medium 930, which cause processor 910 itself and call transceiver 920 to perform the roaming method described in the previous embodiment of the present application.
Additionally, embodiments of the present application provide a machine-readable storage medium 930, the machine-readable storage medium 930 storing machine-executable instructions that, when invoked and executed by the processor 910, cause the processor 910 itself and the invoking transceiver 920 to perform the roaming method described in the previous embodiments of the present application.
The implementation process of the functions and roles of each unit in the above device is specifically shown in the implementation process of the corresponding steps in the above method, and will not be described herein again.
For the device embodiments, reference is made to the description of the method embodiments for the relevant points, since they essentially correspond to the method embodiments. The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purposes of the present application. Those of ordinary skill in the art will understand and implement the present application without undue burden.
For the roaming device and the machine readable storage medium embodiments, the description is relatively simple, and reference should be made to the description of the method embodiments for relevant points, since the method content involved is substantially similar to that of the method embodiments described above.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather to enable any modification, equivalent replacement, improvement or the like to be made within the spirit and principles of the application.

Claims (13)

1. A roaming method, wherein the method is applied to a backup AC, the backup AC being in a WLAN, the WLAN further comprising a client, a first primary AC, a second primary AC, a first AP, and a second AP, the client accessing the first primary AC through the first AP, the second AP accessing the second primary AC, the method comprising:
the backup AC receives the notification message sent by the first main AC and locally stores roaming information of the client included in the notification message;
when the client roams to the second AP, the backup AC receives a query message sent by the second main AC, wherein the query message comprises access information of the client;
When the roaming information matched with the access information is found locally, the backup AC sends a check passing message to the second main AC, so that the second main AC obtains user information from the first main AC through the backup AC, and the client performs data communication through the second main AC.
2. The method of claim 1, wherein after the backup AC sends a check pass message to the second primary AC, the method further comprises:
the backup AC receives a migration user request message sent by the second main AC through a message according to the verification, wherein the migration user request message comprises attribute information of the client;
according to the attribute information, the backup AC forwards the migration user request message to the first main AC;
the backup AC receives a migration user response message sent by the first main AC according to the migration user request message, wherein the migration user response message comprises the user information;
the backup AC forwards the migration user response message to the second primary AC to cause the second primary AC to store the user information locally.
3. The method of claim 2, wherein after the backup AC forwards the migration user response message to the second primary AC, the method further comprises:
The backup AC receives the update message sent by the second main AC and updates the roaming information according to the update message;
the backup AC sends a delete message to the first primary AC to cause the first primary AC to delete the locally stored user information.
4. The method of claim 1, wherein the access information comprises a MAC address of the client, a service set identifier, SSID, and network access information;
the local searching of the roaming information matched with the access information specifically comprises:
in the locally stored roaming information, the backup AC searches whether roaming information consistent with the MAC address of the client, the service set identifier SSID and the network access information included in the access information exists;
if so, the backup AC sends a check passing message to the second primary AC.
5. The method of claim 1, wherein the client is an 802.1X client, and wherein the access information comprises a MAC address of the client, a service set identifier SSID, network access information, and key information;
the local searching of the roaming information matched with the access information specifically comprises:
In the locally stored roaming information, the backup AC searches whether roaming information consistent with the MAC address of the client, the service set identifier SSID, the network access information and the key information included in the access information exists;
if so, the backup AC sends a check passing message to the second primary AC.
6. The method of claim 1, wherein after the backup AC sends a check pass message to the second primary AC, the method further comprises:
the backup AC receives an update user request message sent by the second main AC through a message according to the verification, wherein the update user request message comprises attribute information of the client;
according to the attribute information, the backup AC forwards the user update request message to the first main AC so that the first main AC updates the user information;
the backup AC receives an update user response message sent by the first main AC according to the update user request message, wherein the update user response message comprises updated user information;
the backup AC forwards the updated user response message to the second master AC, so that the second master AC stores the updated user information locally.
7. The method of claim 6, wherein after the backup AC forwards the update user response message to the second primary AC, the method further comprises:
the backup AC receives a charging update message periodically sent by the second main AC, wherein the charging update message comprises the MAC address of the client, flow information and access AP information;
and forwarding the charging update message to the first main AC by the backup AC according to the MAC address of the client so that the first main AC performs charging interaction with the AAA server according to the MAC address of the client, the flow information and the accessed AP information.
8. A roaming method, wherein the method is applied to a backup AC, the backup AC being in a WLAN, the WLAN further comprising a client, a first primary AC, a first AP, and a second AP, the client accessing the first primary AC through the first AP, the second AP accessing the backup AC, the method comprising:
the backup AC receives the notification message sent by the first main AC and locally stores roaming information of the client included in the notification message;
when the client roams to the second AP, the backup AC acquires access information of the client through the second AP;
When the roaming information matched with the access information is found locally, the backup AC acquires the user information of the client from the first main AC, and the client performs data communication through the backup AC.
9. The method according to claim 8, wherein the backup AC obtains the user information of the client from the first main AC, specifically comprising:
the backup AC sends a migration user request message to the first main AC;
the backup AC receives a migration user response message sent by the first main AC according to the migration user request message, wherein the migration user response message comprises the user information;
and the backup AC updates the user information and stores the updated user information to the local.
10. The method of claim 9, wherein after the backup AC obtains the user information of the client from the first primary AC, the method further comprises:
and according to the updated user information, the backup AC updates the roaming information and sends a deleting message to the first main AC so that the first main AC deletes the locally stored user information.
11. The method of claim 8, wherein the access information comprises a MAC address of the client, a service set identifier, SSID, and network access information;
the local searching of the roaming information matched with the access information specifically comprises:
in the locally stored roaming information, the backup AC searches whether roaming information consistent with the MAC address of the client, the service set identifier SSID and the network access information included in the access information exists;
if so, the backup AC acquires the user information of the client from the first main AC.
12. A roaming apparatus, the apparatus being applied to a backup AC, the backup AC being in a WLAN, the WLAN further comprising a client, a first primary AC, a second primary AC, a first AP, and a second AP, the client accessing the first primary AC through the first AP, the second AP accessing the second primary AC, the apparatus comprising:
a receiving unit, configured to receive a notification message sent by the first master AC;
a storage unit, configured to locally store roaming information of the client included in the notification message;
the receiving unit is further configured to receive a first query message sent by the second master AC when the client roams to the second AP, where the first query message includes access information of the client;
And the sending unit is used for sending a verification passing message to the second main AC when the roaming information matched with the access information is locally found, so that the second main AC obtains the user information from the first main AC through the backup AC, and the client performs data communication through the second main AC.
13. A roaming device, the device being applied to a backup AC, the backup AC being in a WLAN, the WLAN further comprising a client, a first primary AC, a first AP, and a second AP, the client accessing the first primary AC through the first AP, the second AP accessing the backup AC, the device comprising:
a receiving unit, configured to receive a notification message sent by the first master AC;
a storage unit, configured to locally store roaming information of the client included in the notification message;
the acquisition unit is used for acquiring access information of the client through the second AP when the client roams to the second AP;
the obtaining unit is further configured to obtain, when the roaming information matched with the access information is found locally, user information of the client from the first main AC by using the backup AC, where the client performs data communication through the backup AC.
CN202010361702.8A 2020-04-30 2020-04-30 Roaming method and device Active CN111698747B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010361702.8A CN111698747B (en) 2020-04-30 2020-04-30 Roaming method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010361702.8A CN111698747B (en) 2020-04-30 2020-04-30 Roaming method and device

Publications (2)

Publication Number Publication Date
CN111698747A CN111698747A (en) 2020-09-22
CN111698747B true CN111698747B (en) 2023-10-20

Family

ID=72476892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010361702.8A Active CN111698747B (en) 2020-04-30 2020-04-30 Roaming method and device

Country Status (1)

Country Link
CN (1) CN111698747B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113453218B (en) * 2021-05-24 2023-12-26 新华三技术有限公司成都分公司 Table entry processing method and apparatus

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730194A (en) * 2009-12-31 2010-06-09 福建星网锐捷网络有限公司 Terminal access method, terminal access system and access controller
CN101951616A (en) * 2010-07-06 2011-01-19 北京星网锐捷网络技术有限公司 Switching method, system and device for wireless controller
WO2011121295A1 (en) * 2010-03-30 2011-10-06 British Telecommunications Public Limited Company System and method for wlan roaming traffic authentication
CN102256250A (en) * 2011-07-08 2011-11-23 杭州华三通信技术有限公司 Wireless terminal information synchronization method in wireless local area network and equipment thereof
WO2017054532A1 (en) * 2015-09-28 2017-04-06 中兴通讯股份有限公司 Control message transmitting method and apparatus
CN107820246A (en) * 2016-09-14 2018-03-20 华为技术有限公司 The methods, devices and systems of user authentication
CN109561458A (en) * 2018-11-28 2019-04-02 新华三技术有限公司 A kind of AC backup method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103781149B (en) * 2012-10-26 2017-04-26 华为技术有限公司 BBusiness message forwarding processing method , system and access point AP
US9780966B2 (en) * 2013-04-10 2017-10-03 Bomgar Corporation Network apparatus for secure remote access and control

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730194A (en) * 2009-12-31 2010-06-09 福建星网锐捷网络有限公司 Terminal access method, terminal access system and access controller
WO2011121295A1 (en) * 2010-03-30 2011-10-06 British Telecommunications Public Limited Company System and method for wlan roaming traffic authentication
CN101951616A (en) * 2010-07-06 2011-01-19 北京星网锐捷网络技术有限公司 Switching method, system and device for wireless controller
CN102256250A (en) * 2011-07-08 2011-11-23 杭州华三通信技术有限公司 Wireless terminal information synchronization method in wireless local area network and equipment thereof
WO2017054532A1 (en) * 2015-09-28 2017-04-06 中兴通讯股份有限公司 Control message transmitting method and apparatus
CN107820246A (en) * 2016-09-14 2018-03-20 华为技术有限公司 The methods, devices and systems of user authentication
CN109561458A (en) * 2018-11-28 2019-04-02 新华三技术有限公司 A kind of AC backup method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
FitAP在企业无线局域网中的应用;强人;;有色冶金设计与研究(第06期);全文 *
校园无线局域网非法接入及数据安全问题研究;林育深;武玉刚;阮锦新;;广东第二师范学院学报(03);全文 *

Also Published As

Publication number Publication date
CN111698747A (en) 2020-09-22

Similar Documents

Publication Publication Date Title
EP1574010B1 (en) Inter-proxy communication protocol for mobile ip
US6795857B1 (en) Methods and apparatus for providing mobility of a node that does not support mobility
KR100731642B1 (en) Method and apparatus for indicating service set identifiers to probe for
WO2018205147A1 (en) Slice-based communication method and device
US20040234075A1 (en) Mobile IP authentication
CN107820700B (en) Learned roaming authentication profiles
US7477632B1 (en) Subscriber management and service profiles
US20220295269A1 (en) Network access authentication method and device
US20170134940A1 (en) Selective key caching for fast roaming of wireless stations in communication networks
JP6086392B2 (en) Method, station, and access point for accessing a wireless local area network
JP2002520708A (en) Authentication in telecommunications networks
JP2003522504A (en) Method and system for obtaining identification information about a monitored party in a communication network
US20120159576A1 (en) Method, apparatus and system for updating authentication, authorization and accounting session
US20190387028A1 (en) Systems and methods for accessing a private network
CN112672351A (en) Wireless local area network authentication method and device, electronic equipment and storage medium
US8059598B2 (en) Wireless communication system and method for managing service flow identifier in the same
US11743258B2 (en) Access authenticating
CN111698747B (en) Roaming method and device
CN111132305A (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
US7421077B2 (en) Mobile IP authentication
CN113099449B (en) Authentication method and system of distributed core network and home subscriber server
CN110891272B (en) Wireless network access authentication method and device
EP4131048A1 (en) Random media access control address with fast reconnection mechanism
KR100922899B1 (en) Method of authentication control of access network in handover of mobile terminal, and system thereof
CN109962834B (en) Information processing method, system, terminal and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant